BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT



Similar documents
Rashmi Knowles Chief Security Architect EMEA

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

After the Attack. The Transformation of EMC Security Operations

Advanced Threats: The New World Order

The Future of the Advanced SOC

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Security Analytics for Smart Grid

The Next Generation Security Operations Center

RSA Security Anatomy of an Attack Lessons learned

Using Network Forensics to Visualize Advanced Persistent Threats

Getting Ahead of Advanced Threats

Intelligence Driven Security

The session is about to commence. Please switch your phone to silent!

BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Best Practices to Improve Breach Readiness

How To Create Situational Awareness

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

RSA Security Analytics

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Advanced Persistent Threats

Data Science Transforming Security Operations

THE EVOLUTION OF SIEM

RSA SECURITY MANAGEMENT. An Integrated approach to risk, operations and incident management. Solution Brief

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

RSA Security Analytics the complete approach to security monitoring or how to approach advanced threats

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Developing Secure Software in the Age of Advanced Persistent Threats

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Continuous Network Monitoring

Combating a new generation of cybercriminal with in-depth security monitoring

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Speaker Info Tal Be ery

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Defending Against Data Beaches: Internal Controls for Cybersecurity

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Update On Smart Grid Cyber Security

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

IBM Security Intelligence Strategy

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Comprehensive Advanced Threat Defense

Concierge SIEM Reporting Overview

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

The SIEM Evaluator s Guide

Unified Security, ATP and more

Hunting for the Undefined Threat: Advanced Analytics & Visualization

Accenture Cyber Security Transformation. October 2015

DYNAMIC DNS: DATA EXFILTRATION

Modern Approach to Incident Response: Automated Response Architecture

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Effective Log Management

QRadar SIEM and FireEye MPS Integration

IBM SECURITY QRADAR INCIDENT FORENSICS

Logging In: Auditing Cybersecurity in an Unsecure World

Software that provides secure access to technology, everywhere.

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Glasnost or Tyranny? You Can Have Secure and Open Networks!

A New Perspective on Protecting Critical Networks from Attack:

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Incident Response. Six Best Practices for Managing Cyber Breaches.

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

The Need for Intelligent Network Security: Adapting IPS for today s Threats

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

Overcoming PCI Compliance Challenges

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Security strategies to stay off the Børsen front page

Advanced Threat Protection with Dell SecureWorks Security Services

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

Redefining SIEM to Real Time Security Intelligence

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Incident Response. Proactive Incident Management. Sean Curran Director

After the Attack: RSA's Security Operations Transformed

Hunting for Indicators of Compromise

Joining Forces: Bringing Big Data to your Security Team

SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Cybersecurity The role of Internal Audit

IBM QRadar Security Intelligence April 2013

Covert Operations: Kill Chain Actions using Security Analytics

Cisco Advanced Malware Protection for Endpoints

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

How To Manage Security On A Networked Computer System

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Cisco Cyber Threat Defense - Visibility and Network Prevention

Transcription:

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT Rashmi Knowles RSA, The Security Division of EMC Session ID: Session Classification: SPO-W07 Intermediate

APT1 maintained access to victim networks for an average of 356 days. The longest time period APT1 maintained access to a victim s network was 1,764 days, or four years and ten months. Source Mandiant APT1 Report Feb 2013

Characteristics of Security Maturity RISK VISIBILITY COLLABORATION Step 1: Threat Defense Step 2: Compliance and Defense-in- Depth Step 3: Risk-Based Security Step 4: Business-Oriented

Information Security Maturity Model

Security is becoming a Big Data problem More determined adversary means more data needed to identify attacks More complex IT environment means even simple attacks can hide in plain sight Security professionals are struggling to keep up 1 40% of all survey respondents are overwhelmed with the security data they already collect 35% have insufficient time or expertise to analyze what they collect 1 EMA, The Rise of Data-Driven Security, Crawford, Aug 2012 Sample Size = 200

Advanced Threats are Different 1 TARGETED SPECIFIC OBJECTIVE 2 INTERACTIVE HUMAN INVOLVEMENT 3 STEALTHY LOW AND SLOW System Intrusion Attack Begins Cover-Up Discovery Leap Frog Attacks Cover-Up Complete TIME Dwell Time Response Time Attack Identified Response 1 Decrease Dwell Time 2 Speed Response Time

KNOW YOUR ENEMY What are the common threat vectors? What exploits are commonly used? Threat research groups and vendors Threat teams from competitors Industry working groups

KNOW YOUR PEOPLE Who has enhanced access? Security policy that covers common attack scenarios? Who are my likely targets? Am I continuously tracking employees that have been compromised? Is there a privacy issue?

KNOW YOUR NETWORK The ability to pervasively know what your network looks like on a day-to-day basis is critical in helping to identify advanced threats

THE KILL CHAIN Lockheed Martin methodology Seven steps Guides analysis to actionable intelligence Recon Weapon Deliver Exploit Install C2 Action

ORGANISATIONS MUST GET CREATIVE Focus on early detection of breaches to minimize your window of vulnerability. Move backward in the Kill chain The key is actively preserving, aggregating and reviewing data to detect a potential intrusion but also for post-event forensics. Recon Weapon Deliver Exploit Install C2 Action

SINGLE EVENT MENTALITY Recon Weapon Deliver Exploit Install C2 Action Recon Weapon Deliver Exploit Install C2 Action

INVESTIGATION TODAY... Attacker Surveillance Target Analysis Access Probe Attack Set-up System Intrusion Attack Begins Cover-up Starts Discovery/ Persistence Leap Frog Attacks Complete Cover-up Complete Maintain foothold TIME Transactions Information Infrastructure Traffic Identity Are we seeing suspicious transactions against sensitive/high value apps/assets What kind of data does this system store, transmit, process? Is this a regulatory issue? High value IP? Has the server been manipulated? Is it vulnerable? Has its config changed recently? Is it compliant with policy? Are there traffic anomalies to/from these servers Protocol Distribution Encryption Suspicious destinations Which users were logged onto them Have their priv. been escalated? Where did they log in What else did they touch? Sources Sources Sources Sources Sources WFD Transaction Monitoring SIEM SQL server logs DLP Data Classification GRC GRC System Config Mgmt Vul. Mgmt Netflow Network Forensics Web Proxy Logs SIEM Active Directory Netflow Server Logs Asset Management SIEM

PERVASIVE VISIBILITY You must be able to see everything Full network packet capture Identifying Malware Tracking attackers activities inside the environment Presenting proof of illicit activity

DEEPER ANALYTICS Combine disparate data Behaviour patterns and risk factors Value of assets vs. risk Eliminate known good activities Should not replace human judgement

MASSIVE SCALABILITY Volume and speed of data Internal and external feeds Analytics engine to normalise data Distributed storage architecture

UNIFIED VIEW Automated processes Correlated information Speeds up decision making Compliance becomes a by-product

CUSTOMER MATURITY MODEL Advanced Threats Become the Major Spend Driver as Customers Mature Security Level 1 Naïve/Cost-based Security Level 2 Compliance-driven Security Level 3 IT risk-driven Security Level 4 Business risk-driven Approach Security is necessary evil Check-box mentality Proactive and assessmentbased Security fully embedded in enterprise processes Reactive and decentralized monitoring Implement security and collect data to be compliant Assess risks and detect threats for organization as a whole Assess business risks to drive security implementation Technology Tactical threat defenses Tactical threat defenses enhanced with tracking and reporting tools Security tools integrated with common data and management platform Security tools integrated with business tools e.g. egrc Regulatory Environment New leadership Security breaches; customer demand

DETECTION AND RESPONSE Cyber Threat Intelligence Advanced Tools, Tactics & Analysis Critical Incident Response Team Open/All Source Actor Attribution Attack Sensing & Warning Social Media High Value Target (HVT) Reverse Malware Engineering Host & Network Forensic Cause & Origin Determination Email operations Eyes-on-Glass End User Intake Event Triage Incident Containment 24x7 Coverage Content Analytics Team Integration Content Development Reporting Alert and Rule Creation Reporting Integration Alert and Rule Creation Content Development Recon Weapon Deliver Exploit Install C2 Action

BREAKING THE KILL CHAIN Recommendations Focus on Risk, Context and Agility Reduce dwell time Move back in the Kill Chain Continuous monitoring see everything! Implement automation

The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him. - Sun Tzu, The Art of War

Thank you! Rashmi Knowles RSA, The Security Division of EMC @knowlesrashmi Rashmi.knowles@emc.com www.emc.com